Last month, hackers leaked to the systems of the Bybit platform led to the stolen of crypto currency worth $ 1.4 billion. According to Safe Wallet’s statement, the abuse of a developer’s seized computer and AWS session markers in the attack played a critical role. Safa Wallet, which cooperates with Cyber Security Company Mandiant, announced that it has restructured the security protocols. The Federal Bureau of Investigation (FBI) found that the attack was associated with North Korean -related tradrtaitor group.
Stages of the attack and examination process
The attack began with the seizure of a computer of a Safe Wallet employee (Developer1) with high access authority. Malicious software of hackers managed to overcome the multi -factor authentication (MFA) system. Then the attackers who seized AWS session markers, Bybit’s Ethereum $2,138.94 He provided access to his hot wallet. Most of the stolen funds were Lido Staked Ethereum (Steth).
The technical analysis conducted by Mandiant showed that the attack was carried out by a multi -stage and organized cyber crime group. FBI’s pre -findings revealed that the attack methods resembled North Korea’s tactics to obtain financial resources. Within the scope of the investigation, Blockchain is also cooperating with Blockchain analysis companies to trace the stolen funds.
On a single screen instant prices, important data, news, latest developments, comments and discussions at Chat! Come right away from your eyes!
Rooted changes in security measures
Safe Wallet transformed access controls after the attack into a layered system. Employees have been limited to access to high -authority systems, instant permission mechanisms and strict inspections. In the AWS infrastructure, the use of session markers were shortened, while additional identity steps were made compulsory in all operations.
Bybit changed the management policy of hot wallets and transferred most of the funds to cold wallets. The platform has announced that it has established an artificial intelligence -based monitoring system that can detect abnormal movements for user accounts. Both companies will perform regular security tests with independent audit companies.
Responsibility Rejection: The information contained in this article does not contain investment advice. Investors should be aware that crypto currencies carry high volatility and thus risk and carry out their operations in line with their own research.